An efficiently secure ECC scalar multiplication method against Power Analysis Attacks on resource constrained devices

Communications and Information Technology(2017)

引用 2|浏览2
暂无评分
摘要
Elliptic Curve Cryptosystems (ECC) are believed to offer same level of security such as RSA with a much shorter key length, and thus they seem to be ideal for applications with computation resource-restricted devices such a wireless sensor networks (WSN), smart cards, radio frequency identity (RFID), etc. However, like any other cryptographic primitive, ECC implementations are vulnerable to Power Analysis Attacks (PAA) that may reveal the secret keys by exploiting leaked power consumption from running cryptographic devices. In this paper, we propose an ECC Scalar Multiplication (ECSM) method that provides security against PAA on resource constrained devices. The main idea of propose method is to confuse the attacker by delaying some computations using buffering techniques. The proposed method has been implemented on Altera Cyclone III EP3C80F780C7 FPGA over GF(2173), GF(2191), and GF(2230). The results show that the proposed method is very promising in terms of time, area and power for resource constrained devices.
更多
查看译文
关键词
field programmable gate arrays,public key cryptography,altera cyclone iii ep3c80f780c7 fpga,ecc implementations,rfid,rsa,buffering techniques,computation resource-restricted devices,cryptographic devices,cryptographic primitive,efficiently secure ecc scalar multiplication method,elliptic curve cryptosystems,key length,leaked power consumption,power analysis attacks,radio frequency identity,resource constrained devices,secret keys,smart cards,wireless sensor networks,differential power analysis attacks,scalar multiplication,simple power analysis attacks,elliptic curve cryptography,elliptic curves
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要